Site Menu

null.gif Home
null.gif Members
null.gif News
null.gif Downloads
null.gif Content
null.gif Site
null.gif Drugs
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess

Site Info

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 9,835,678
  • Today: 762
Server InfoServer Info
  • Dec 07, 2022
  • 06:11 pm EST
 

Resources



Passwords

PC Tools Password Generator
Boutrager CGI Passwords
.htaccess Password Generator

Favicons

Favicon maker- Create a favicon from any image

CSS Scrollbars

CSS Scrollbar

SEO

SEO: Search Engine Optimization
SEO: Search Engine Optimization

Powered by RavenNuke™

Powered by RavenNuke(tm)

Evaders Squadron Coding

Evaders Squadron Coding

Clan Templates

Php Nuke Clan Themes

DaDaNuke

dadanuke.org: addons, themes, fixes, mods and support for PhPNuke/RavenNuke™ CMS

Papa Mike Creations

Papa Mike Creations

Honeypot

Stop Spam Harvesters, Join Project Honey Pot

VB Script

VisualBasicScript.com

PhP Resources

The PHP Resource Index

PhP Junkyard

Free PHP scripts for download

Coffeecup

CoffeeCup - HTML Editor- Flash - Web Design Software

Memory

Crucial Memory

NMAP

NMAP Security Scanner

Pirate Bay
The Pirate Bay

AX4
Tricks • Secrets • Bugs • Fixes

Tizag
Tizag Web Tutorials

Reporter's Desktop
Reporter's Desktop

NukeSentinel™

This is the list of NukeSentinel(tm) banned IP addresses.

  • 194.165.17.*
  • 194.165.16.*
  • 2.58.56.*
  • 85.239.45.*
  • 20.210.255.*
  • 5.254.31.*
  • 146.70.128.*
  • 188.130.128.*
  • 154.202.120.*
  • 154.84.143.*
  • 154.202.122.*
  • 20.219.100.*
  • 88.214.25.*
  • 116.97.108.*
  • 196.244.192.*
  • 20.171.102.*
  • 91.207.114.*
  • 185.190.24.*
  • 20.125.130.*
  • 85.90.247.*

Trophy

Thank you, Navy SEALs

NukeSentinel™

You have been warned!
We have caught 2683 shameful hackers.

PC VIRUS LISTING

TextFiles: Jim Goodwin

          This document is copyrighted, 1989, by Jim Goodwin.  It
          may be freely distributed provided no changes,
          additions or deletions are made, and providing this
          copyright notice accompanies all copies.  I would like
          to thank John McAfee and the entire HomeBase users
          group for providing the raw materials for this
          document.

     It is difficult to name, identify and classify PC viruses.
Everyone who first discovers a virus will name it and describe
what they think of it.  In most cases, the virus is not new and
has been named and described dozens of times before.  None of the
names and few of the descriptions will match.  While I'm writing
this, for example, I feel certain that someone, somewhere has
just been infected by the Jerusalem virus and they are telling
their co-workers and friends about it as if it were newborn - and
for them perhaps it is.  It will be impossible to verify the
strain and variety of the infection, however, unless we can get a
living sample of the virus to analyze and compare with other
strains of this same virus.  So problem number one is filtering
the reports of infection and collecting samples that can be
placed under the knife.

     Problem number two is - where do you draw the line between
an original virus and a true variation of the virus?  The
original Brain virus, for example, could only infect a floppy
diskette.  Do the varieties of the Brain that can infect hard
disks (but in every other respect are identical) deserve to be
called new viruses, or are they still the Brain?  What about
further modifications that destroy data?  Is this now a new
virus?  What if someone extracts a segment of the Brain code and
uses it as a basis for a new virus?  What if nothing changes but
the imbedded text data, so that the virus is in every way
functionally identical, but the volume label changes to "SMURF"
instead of BRAIN.  All of these modifications to the Brain have
been discovered and logged.  How do we deal with them?
     I choose to deal with these modifications in the simplest
way I know.  If the virus differs in any way from the original
(assuming that the "original" can in fact be identified), then I
log it as a new strain.  This relieves me from having to make
decisions.  Those of you who see the world differently can merely
take this listing and lump together all of the different strains
that you like.  That way we'll all be happy.

     This will be, by the way, my last virus document.  I have
worked double time for the past eighteen months helping John
McAfee and his Homebase folks and, while I have thouroughly
enjoyed myself, I have finally burned out.  It has been great fun
and I've learned a lot, and hopefully some of my works, like the
product review with Sankary and Marsh, will end up being somehow
useful to the world.  But now I have the irresistible urge to go
fishing, and, perhaps afterwards, to contemplate my navel for a
few years.  In-between times I intend to write a book on the
craziness in this industry and about the unique personalities
I've had the pleasure to work with in the Virus Marine Corps.
It's been quite an adventure.  Thank you all.

Jim Goodwin    From the Homebase BBS  408 988 4004

                    THE VIRUSES

     I have arranged these viruses so that similar varieties are
described in the sequence in which they appeared within the virus
sub-group (to the best of my knowledge).  Not everyone agrees
with my groupings.  Many people believe, for instance, that the
Golden Gate-C (Mazatlan Virus) is a distinctly original virus and
is not a variation of the Alameda.  I think differently and have
endeavored to show how the Golden Gate evolved from the Alameda,
through each precursor virus.  I cannot prove, of course, that
the sequence of appearances is the correct sequence, and in many
cases I have had to guess.  If anyone wishes to re-order
these virus, I will not be offended.

     I have not included any of the specific application trojans
in this list.  There has been a lot of discussion about the Lotus
123 and DBASE "viruses", for example.  These are not replicating
programs and I do not classify them as viruses.  I had originally
intended a separate list to include these non-replicating trojans
but Time caught up with me.

TextFiles


Short URL:
Computers
Posted on Friday, January 25, 2013 @ 22:34:14 EST by Southern 

click Related        click Rate This        click Share
Associated TopicsComputers

Topics

Forums

Babes


© ThemeFreaks

GCalendar

<< December 2022 >>

S M T W T F S
        123
45678910
11121314151617
18192021222324
25262728293031

bookmark site


Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage


Support RavenNuke™

RavenNuke(tm) v2.40.01

Proverbs

17:13, Whoso rewardeth evil for good, evil shall not depart from his house.

R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months

Support Our Troops

Support Our Troops


© ThemeFreaks

Honey Pot

Bots in the pot!
We have [362] bots in the pot!

Page Generation: 0.61 Seconds